Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Software Term License
"I need a Software Term License agreement for licensing our enterprise resource planning software to a manufacturing company in Mumbai, with provisions for 500 concurrent users and implementation services to be completed by March 2025."
1. Parties: Identification and details of the licensor and licensee
2. Background: Context of the agreement and brief description of the software
3. Definitions: Definitions of key terms used throughout the agreement
4. Grant of License: Scope and nature of the license being granted
5. License Term and Renewal: Duration of the license and renewal provisions
6. License Fees and Payment Terms: Financial terms, payment schedule, and related conditions
7. Permitted Use and Restrictions: Specific permissions and limitations on software usage
8. Installation and Implementation: Process and responsibilities for software deployment
9. Maintenance and Support: Terms of technical support and software updates
10. Intellectual Property Rights: Protection and ownership of IP rights
11. Warranties and Representations: Guarantees provided by both parties
12. Limitation of Liability: Scope and limits of party liabilities
13. Confidentiality: Protection of confidential information
14. Termination: Conditions and process for agreement termination
15. Post-Termination Obligations: Responsibilities after agreement ends
16. Governing Law and Jurisdiction: Applicable law and dispute resolution mechanism
17. General Provisions: Standard boilerplate clauses including notices, assignment, etc.
1. Data Protection and Privacy: Required when software processes personal data or when compliance with specific data protection regulations is needed
2. Multi-User License Terms: Include when software is licensed for multiple users or enterprise-wide usage
3. Export Control: Required for software with international usage or containing controlled technology
4. Source Code Escrow: Include when source code access might be needed in specific circumstances
5. Disaster Recovery: Required for critical software applications where business continuity is essential
6. Security Requirements: Include when specific security protocols or compliance standards must be met
7. Training and Documentation: Required when comprehensive training and documentation are part of the license
8. Third-Party Software Components: Include when the software contains third-party elements requiring separate licensing terms
1. Schedule A - Software Description: Detailed technical specifications and functionality of the software
2. Schedule B - License Fees: Detailed breakdown of all applicable fees and payment terms
3. Schedule C - Service Level Agreement: Performance metrics, support levels, and response times
4. Schedule D - Implementation Plan: Timeline and milestones for software deployment
5. Schedule E - Acceptance Testing: Testing criteria and acceptance procedures
6. Schedule F - Authorized Users: List of permitted users or user categories and access levels
7. Schedule G - Technical Requirements: Hardware and system requirements for software operation
8. Appendix 1 - Support and Maintenance Terms: Detailed terms of technical support and maintenance services
Authors
Authorized Users
Business Day
Confidential Information
Documentation
Effective Date
Error
Fees
Force Majeure Event
Initial Term
Intellectual Property Rights
License Key
License Term
Licensed Software
Maintenance Services
Modifications
Operating Environment
Permitted Purpose
Renewal Term
Service Levels
Software Updates
Source Code
Specifications
Support Services
System Requirements
Technical Support
Territory
Third Party Software
User Manual
Virus
Working Hours
Workspace
Critical Error
Minor Error
Designated Contact
Implementation Services
Installation Site
License Metrics
Maintenance Window
Response Time
Security Standards
Service Credits
Software Version
Support Level Agreement
User Access Level
License Restrictions
Term and Termination
Payment
Intellectual Property
Confidentiality
Data Protection
Warranties
Liability Limitation
Indemnification
Force Majeure
Assignment
Audit Rights
Technical Support
Maintenance
Implementation
Service Levels
Security
Acceptance Testing
Documentation
User Rights
Export Control
Dispute Resolution
Governing Law
Notice
Third Party Rights
Entire Agreement
Amendment
Severability
Counterparts
Software Updates
Training
Compliance
Insurance
Escrow
Performance
Reporting
Survival
Anti-corruption
Non-solicitation
Information Technology
Banking and Financial Services
Healthcare
Manufacturing
Retail
Education
Telecommunications
Professional Services
Government and Public Sector
E-commerce
Media and Entertainment
Insurance
Automotive
Pharmaceuticals
Energy and Utilities
Legal
Information Technology
Procurement
Compliance
Finance
Information Security
Vendor Management
Operations
Risk Management
Software Asset Management
Chief Technology Officer
IT Director
Procurement Manager
Legal Counsel
Software Licensing Manager
Compliance Officer
IT Security Manager
Contract Administrator
Software Asset Manager
Chief Information Officer
Technology Procurement Specialist
Vendor Management Officer
Enterprise Architect
IT Operations Manager
Chief Financial Officer
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.